Today’s Lesson
Security for Legal SaaS — Episode 21: Multi-Factor Authentication
Why Passwords Alone Are Not Enough
In Episode 17, we examined how passwords are stored securely using hashing algorithms like bcrypt and Argon2id. But even a perfectly hashed password has a fundamental limitation: it is a single factor. If an attacker obtains a user's password — through phishing, credential stuffing, a breach of another service, or simple guesswork — they have everything they need to impersonate that user.
Multi-factor authentication (MFA) addresses this by requiring evidence from two or more independent categories before granting access. Microsoft's analysis of account compromises found that MFA blocks 99.9% of automated attacks on accounts.1 For legal SaaS platforms handling privileged client communications and case strategy, MFA is not optional — it is a baseline professional obligation.
The Three Factor Categories
Authentication factors fall into three categories:
| Category | Description | Examples |
|---|---|---|
| Something you know | A secret the user has memorised | Password, PIN, security question |
| Something you have | A physical object the user possesses | Phone (for TOTP codes), hardware security key, smart card |
| Something you are | A biometric characteristic | Fingerprint, face scan, iris pattern |
True MFA requires factors from at least two different categories. Two passwords are not MFA — they are two instances of the same factor category. A password (something you know) combined with a six-digit code from an authenticator app on your phone (something you have) qualifies because it draws from two independent categories.2
NIST SP 800-63B formalises this through Authenticator Assurance Levels (AALs). AAL1 permits single-factor authentication. AAL2 requires multi-factor authentication — at minimum, a password plus a second factor. AAL3 requires hardware-based cryptographic authenticators, such as FIDO2 security keys.3 Any system handling personally identifiable information must implement at least AAL2.
MFA Methods Compared
Not all second factors provide equal security. The table below ranks common methods from weakest to strongest:
| Method | Factor Type | Phishing Resistant? | Strengths | Weaknesses |
|---|---|---|---|---|
| SMS codes | Something you have (phone number) | No | Easy to deploy, familiar to users | Vulnerable to SIM swapping, SS7 interception, real-time phishing relays |
| Email codes | Something you have (email account) | No | No app installation required | Depends on email security; phishable; delays in delivery |
| TOTP apps (Google Authenticator, Authy) | Something you have (device with shared secret) | No | Works offline, no SMS dependency | Codes can be phished in real time; shared secret can be extracted from compromised devices |
| Push notifications (Duo, Microsoft Authenticator) | Something you have (registered device) | Partial | Convenient; harder to phish than codes | Vulnerable to MFA fatigue attacks (repeated push spam) |
| Hardware security keys (YubiKey, Titan) | Something you have (physical key) | Yes | Cryptographically bound to domain; immune to phishing | Physical device required; cost per key; loss/replacement logistics |
| Passkeys / WebAuthn | Something you have + something you are | Yes | Phishing resistant; no shared secret; synced across devices | Ecosystem still maturing; platform lock-in concerns |
Key stat: NIST SP 800-63B explicitly deprecates SMS as a standalone second factor due to demonstrated vulnerabilities in the telephone network, including SIM swap fraud and SS7 protocol exploitation.4
TOTP: The Current Workhorse
Time-Based One-Time Passwords — TOTP, defined in RFC 6238 — are the most widely deployed MFA method in legal SaaS today.5 During setup, the server generates a shared secret and displays it as a QR code. The user scans it with an authenticator app (Google Authenticator, Authy, 1Password). Every 30 seconds, both the server and the app independently compute a six-digit code from the shared secret combined with the current timestamp. At login, the user enters the current code to prove they possess the device holding the secret.
TOTP is a substantial improvement over passwords alone. It works offline, requires no SMS delivery infrastructure, and is free to implement. But it has limitations:
- Phishable. An attacker who creates a convincing fake login page can capture both the password and the TOTP code in real time, then relay them to the real server before the code expires. This is called a real-time phishing proxy.6
- Shared secret exposure. The TOTP seed is a symmetric secret — if the server's database of TOTP seeds is breached, every user's second factor is compromised simultaneously.
- Backup code risk. Most implementations generate one-time backup codes at enrolment. These are often stored insecurely by users (screenshots, notes apps, email to self) and become a secondary attack vector.
Push Notifications and MFA Fatigue
Push-based MFA — where the user approves a login attempt by tapping "Approve" on their phone — improves usability over typing codes. But it introduced a new attack vector: MFA fatigue.
Case study: Uber, September 2022. An attacker purchased stolen credentials for an Uber contractor from a dark web marketplace. When MFA push notifications blocked the initial login, the attacker sent over 40 push notifications in 30 minutes to the contractor's phone, then contacted them via WhatsApp pretending to be Uber IT security, telling them to approve the notification to make it stop. The contractor complied. The attacker gained VPN access, found admin credentials in a PowerShell script, and escalated to full administrative control over Uber's cloud infrastructure.7
Mitigations for MFA fatigue include number matching (the user must type a number displayed on the login screen into the push notification, proving they can see both screens), location context (showing the geographic origin of the login attempt), and rate limiting push requests. Microsoft, Okta, and Duo have all added number matching as a default or recommended setting since the Uber incident.8
Passkeys and WebAuthn: The Phishing-Resistant Endgame
WebAuthn, the web standard developed by the W3C and the FIDO Alliance, uses public-key cryptography instead of shared secrets.9 During registration, the authenticator generates a unique key pair. The private key never leaves the device. The public key is sent to the server. During authentication, the server sends a challenge; the authenticator signs it with the private key, and the server verifies the signature against the stored public key.
Critically, WebAuthn binds the credential to the origin (the website's domain). The authenticator checks that the domain requesting authentication matches the domain where the credential was registered. A phishing site at `login-legalplatform.com` cannot trick the authenticator into signing a challenge for `legalplatform.com`. Phishing becomes cryptographically impossible — not just difficult, but mathematically excluded.10
Passkeys are the consumer-friendly evolution of WebAuthn. They sync the private key across devices using platform-specific vaults (iCloud Keychain, Google Password Manager, 1Password). This solves the hardware key's biggest usability problem — loss of a single device no longer means lockout. The tradeoff is that the security now depends on the platform account's protection (which should itself be MFA-protected).11
Regulatory momentum: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) explicitly recommends phishing-resistant MFA based on FIDO2/WebAuthn for all organisations, with special urgency for high-value targets — a category that includes law firms holding litigation strategy and M&A communications.12
Recovery Flows: The Weakest Link
The strongest MFA is only as good as its recovery process. If a user loses their second factor, how do they regain access?
Common recovery mechanisms and their risks:
| Recovery Method | Risk |
|---|---|
| SMS-based recovery code | Defeats the purpose of hardware keys; vulnerable to SIM swap |
| Email-based recovery link | Security depends on email account protection |
| Pre-generated backup codes | Often stored insecurely by users |
| Admin manual override | Social engineering risk; requires identity verification procedure |
| Secondary hardware key | Strongest option; requires users to register two keys at enrolment |
The OWASP Multi-Factor Authentication Cheat Sheet recommends treating factor replacement as a high-risk action requiring reauthentication with an existing enrolled factor, never relying solely on the active session.13 For legal SaaS platforms, the recommended approach is: require users to register at least two independent second factors at enrolment, and verify identity through an out-of-band process (phone call with identity verification, physical office visit) before resetting MFA for users who have lost all factors.
Breaches That MFA Would Have Prevented
| Incident | Year | Root Cause | MFA Impact |
|---|---|---|---|
| Colonial Pipeline | 2021 | Compromised VPN password on dormant account with no MFA | Basic MFA on the VPN would have blocked the attack entirely14 |
| Uber | 2022 | MFA fatigue — push notification spam | Phishing-resistant MFA (FIDO2) would have been immune to the social engineering7 |
| Okta (Lapsus$) | 2022 | Compromised support contractor credentials | Hardware key requirement for privileged access would have prevented lateral movement |
| MGM Resorts | 2023 | Social engineering of help desk to reset MFA | Stronger identity verification in recovery flow would have blocked the reset15 |
Mandatory MFA for Legal SaaS: Professional Obligation
The ABA's 2023 Legal Technology Survey Report found that fewer than half of solo practitioners and small firms use MFA — despite ABA Model Rule 1.6(c) requiring "reasonable efforts" to prevent unauthorised access to client information.16 Cyber insurance underwriters have responded: as of 2025, most carriers require MFA on all accounts, 24/7 endpoint monitoring, and a written incident response plan as preconditions for coverage.
For legal SaaS vendors, the calculus is straightforward:
- Enforce MFA for all users, not just admins. Provide TOTP as the baseline, passkeys as the recommended option.
- Offer phishing-resistant MFA (WebAuthn/passkeys) for firms handling high-sensitivity matters — litigation strategy, M&A, government investigations.
- Design recovery flows carefully. Never allow SMS-only recovery to bypass a hardware key enrolment. Require a second registered factor or an identity-verified admin override.
- Log all MFA events — enrolment, successful verification, failed attempts, recovery — with immutable audit trails.
What's Next
Episode 22 covers Single Sign-On, SAML, and Enterprise Identity — how law firms centralise authentication across dozens of SaaS platforms and what security guarantees SSO actually provides (and which it does not).
Sources & Further Reading
Sources & references
- OWASP, Multifactor Authentication Cheat Sheet (citing Microsoft analysis: MFA blocks 99.9% of automated account compromises).
- OWASP, Authentication Cheat Sheet — Multi-Factor Authentication.
- NIST, SP 800-63B: Digital Identity Guidelines — Authentication and Lifecycle Management, Sections 4.2 (AAL2) and 4.3 (AAL3).
- NIST, SP 800-63B Section 5.1.3.3 — restricted status for SMS-based authenticators.
- IETF, RFC 6238: TOTP: Time-Based One-Time Password Algorithm.
- Evilginx / real-time phishing proxy — documented in OWASP Testing Guide, Testing Multi-Factor Authentication.
- UpGuard, What Caused the Uber Data Breach in 2022?.
- Microsoft, Number matching in multifactor authentication; Duo and Okta adopted similar defaults post-2022.
- W3C, Web Authentication: An API for accessing Public Key Credentials.
- Token2, Why FIDO2 Is More Secure Than TOTP.
- FIDO Alliance, Passkeys — FIDO Alliance Specifications.
- CISA / IDManagement.gov, Phishing-Resistant Authenticator Playbook.
- OWASP, Multifactor Authentication Cheat Sheet — Factor Update Security.
- Wikipedia, Colonial Pipeline Ransomware Attack — VPN account with no MFA enabled.
- BleepingComputer, MGM Resorts Shuts Down IT Systems After Cyberattack (September 2023).
- ABA, 2023 Legal Technology Survey Report — MFA adoption rates across firm sizes.